2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing最新文献

筛选
英文 中文
The Chaotic Cipher Based on CNNs and Its Application in Network 基于cnn的混沌密码及其在网络中的应用
Lei Lu, Lei Zhang
{"title":"The Chaotic Cipher Based on CNNs and Its Application in Network","authors":"Lei Lu, Lei Zhang","doi":"10.1109/IPTC.2011.54","DOIUrl":"https://doi.org/10.1109/IPTC.2011.54","url":null,"abstract":"This paper studied the chaotic cipher based on CNNs chaotic equation and its application in the network environment. Firstly, a improve method for CNNs chaotic properties was given, the variables which has better statistic property and more sensitive to the system parameter be get to generate binary sequence for encrypt. And then, for applying chaotic cipher in network environment, the synchronization method based on the state variables transmission mechanism was proposed, this method can solve the synchronization problem of chaotic stream cipher, and the simulation test results confirm the validity. At last, a chaotic cryptosystem key distribution strategy in network environment was designed.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133011918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel 一种限制隐时信道的自适应干扰策略
Xiong Liu, Haiwei Xue, Yiqi Dai
{"title":"A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel","authors":"Xiong Liu, Haiwei Xue, Yiqi Dai","doi":"10.1109/IPTC.2011.8","DOIUrl":"https://doi.org/10.1109/IPTC.2011.8","url":null,"abstract":"Covert timing channel may compromise multi-level security system, it's necessary to eliminate or restrict them. Jamming covert timing channel is a main method to restrict the channel's capacity, but existing works' jamming strategies don't take the packets arriving rate and queue's length into account, the jamming strategies they use may affect the overt channel's availability. This paper proposes a self adaptive jamming strategy which can adjust the service time according to the packets' arriving rate and the queue's length. The experiment result shows that the new strategy can effectively restrict the covert timing channel and keep the availability of the overt channel.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131161192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Analysis on Direct Anonymous Attestation for Security Chip 安全芯片直接匿名认证的设计与分析
Yu Qin, Qiuxin Wu, XiaoBo Chu
{"title":"Design and Analysis on Direct Anonymous Attestation for Security Chip","authors":"Yu Qin, Qiuxin Wu, XiaoBo Chu","doi":"10.1109/IPTC.2011.11","DOIUrl":"https://doi.org/10.1109/IPTC.2011.11","url":null,"abstract":"Direct Anonymous Attestation (DAA) is an anonymous protocol designed for TPM/TCM or other embedding devices. Recently, DAA schemes based on the pairing continues to advance rapidly, but it has a certain problems to put the scheme into application. This paper focuses on the practicability and feasibility for the design of the pairing DAA protocol and system. Our first contribution in this paper is presenting a pairing less DAA scheme for TCM, only 2 pairings required in the whole protocol, Furthermore no pairing computation required inside TCM. The second contribution is to design and implement a test platform prototype for analyzing and evaluating the pairing DAA scheme. We analyze the influence factors like elliptic curve selection, preprocessing and so on. The experiment results show that the trade-off between the security strength and the performance must be taken into the comprehensive consideration for pairing DAA design.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122591449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Digital Library Technology Research Based on VPN 基于VPN的安全数字图书馆技术研究
Kuobin Dai
{"title":"Secure Digital Library Technology Research Based on VPN","authors":"Kuobin Dai","doi":"10.1109/IPTC.2011.49","DOIUrl":"https://doi.org/10.1109/IPTC.2011.49","url":null,"abstract":"The use of digital library services within the network and the external aspects, analysis of university library network security risks faced by the hardware, software, security risk, technical risk, management risk and the risk of external attacks and other major security risk. Combination of network security technologies, were put forward their own coping strategies. Focus on analysis of hacker attacks and network viruses control methods, including the use of anti-virus protection software, the use of firewall technology, encryption and authentication technology, intrusion detection, VLAN technology, content inspection and monitoring technology, and virtual honey pot technologies. Library network systems only to achieve security of the nature of the equipment, Network technology, professional and management standardization, in order to effectively avoid the risk of a variety of network security and ensure the normal operation of network systems, research on prevention and control of universities Digital library network security risks with a reference and guide.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117234627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trust Based Secure Localization in Wireless Sensor Networks 基于信任的无线传感器网络安全定位
Ting Zhang, Jingsha He, Yang Zhang
{"title":"Trust Based Secure Localization in Wireless Sensor Networks","authors":"Ting Zhang, Jingsha He, Yang Zhang","doi":"10.1109/IPTC.2011.21","DOIUrl":"https://doi.org/10.1109/IPTC.2011.21","url":null,"abstract":"Secure localization in wireless sensor networks (WSNs) has received a great deal of attention with the increasing applications of wireless sensors. Security issues of localization in WSNs need to take into account attacks from both external and internal nodes. In this paper, we propose a secure localization scheme based on trust evaluation called trust based secure localization (TBSL) to evaluate the trust of beacon nodes through detecting the identity and the behavior of such node and using the credible position information for localization in WSNs. Simulation results show that our proposed scheme can improve the accuracy of localization in a hostile environment.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132160958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automatic Summarization for Chinese Text Based on Sub Topic Partition and Sentence Features 基于子主题划分和句子特征的中文文本自动摘要
Xueming Li, Jiapei Zhang, Minling Xing
{"title":"Automatic Summarization for Chinese Text Based on Sub Topic Partition and Sentence Features","authors":"Xueming Li, Jiapei Zhang, Minling Xing","doi":"10.1109/IPTC.2011.40","DOIUrl":"https://doi.org/10.1109/IPTC.2011.40","url":null,"abstract":"With the explosion of electronic information on web, there is the increasing requirement to obtain the information needed accurately and efficiently. In this article, a method of automatic summarization based on sub topic partition and sentence features is proposed, in which the sentence weight is computed based on LexRank algorithm combining with the score of its own features in every sub topic, such as its length, position, cue words and structure. In addition, we reduce redundancy of candidate sentence collection. With evaluation on six different genres of data sets, our method could get more comprehensive and high-quality summarization with less redundancy than the original LexRank algorithm.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"24 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114108211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Applied Study on Information Technology and College English Teaching Integration 信息技术与大学英语教学整合的应用研究
Jinfeng Wang
{"title":"Applied Study on Information Technology and College English Teaching Integration","authors":"Jinfeng Wang","doi":"10.1109/IPTC.2011.66","DOIUrl":"https://doi.org/10.1109/IPTC.2011.66","url":null,"abstract":"The popularity of modern information technology makes it urgent to construct a new English teaching model based on the integration of technology and teaching. Such integration targets at improving the traditional teaching mode, representing a trend in the curriculum reform home and abroad. This paper aims at information technology and college English teaching integration, analyzing the importance and efficient measures for the implementation and spread of new and efficient teaching model and methods.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122313947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-feature Method: An Integrated Content Based Image Retrieval System 多特征方法:一个集成的基于内容的图像检索系统
Chen Liu, Zhou Wei
{"title":"Multi-feature Method: An Integrated Content Based Image Retrieval System","authors":"Chen Liu, Zhou Wei","doi":"10.1109/IPTC.2011.18","DOIUrl":"https://doi.org/10.1109/IPTC.2011.18","url":null,"abstract":"The process of retrieving desired or similar images from a large collection of images on the basis of features is referred as Content Based Image Retrieval (CBIR). In this paper, a integrated CBIR system is proposed using combined features and weighted similarity. The features include visual features of color, texture and shape and key text metadata. Some experimental simulations have been presented to show the accuracy and efficiency of the proposed retrieval method.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Robust Control of One Arm Space Manipulator with Parameters Uncertainties Compensated 参数不确定性补偿的单臂空间机械臂鲁棒控制
Guangyan Xu, Meng Zhang
{"title":"Robust Control of One Arm Space Manipulator with Parameters Uncertainties Compensated","authors":"Guangyan Xu, Meng Zhang","doi":"10.1109/IPTC.2011.60","DOIUrl":"https://doi.org/10.1109/IPTC.2011.60","url":null,"abstract":"According to trajectory tracking control of space robot with parameters uncertainties, the influence of uncertain items on space robot trajectory tracking is taken into consideration. Robust controller based on robust control theory of uncertain systems is designed for the space robot and uncertain items are compensated. Firstly, robust controller is applied to compensate the coriolis force, centrifugal force and other disturbance. Robust control law with items uncertainties compensated is improved and it can meet the demand for control law non-singular. The desired time-varying trajectory can be real-time tracked by manipulators while the attitude of space robot can be controlled. The compensation matrix is proposed. The uncertainty item range can be solved based on PSO and it can be applied to control manipulators. Stability of the improved robust controller is analyzed by Lyapunov function. Finally, the simulation results show that the robust controller has a good performance.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117164207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study on QoS Protection Mechanism of VoIP Systems VoIP系统的QoS保护机制研究
Chunxia Tu
{"title":"Study on QoS Protection Mechanism of VoIP Systems","authors":"Chunxia Tu","doi":"10.1109/IPTC.2011.45","DOIUrl":"https://doi.org/10.1109/IPTC.2011.45","url":null,"abstract":"This paper describes the principles of QoS communications, analysis the requirements of how voip to provide QoS guarantees, clarify the major problems it's facing now. And proposes the solution to the problem of latency, jitter, packet loss and echo effects, with the same time introduces several of the QoS model that can improve the qos of voip, discusses their respective advantages and shortcomings, ultimately concludes that no single technology and models can effectively solve the QOS issues of the VoIP system, application of an integrated QoS solution is the only effectively way to solve this problem.","PeriodicalId":388589,"journal":{"name":"2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134233389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信